Skip to content

Instantly share code, notes, and snippets.

View austinsonger's full-sized avatar
🙃
Localhost

Austin Songer, CISSP austinsonger

🙃
Localhost
View GitHub Profile
@austinsonger
austinsonger / jira-ticket-google-calendar.gs
Created December 2, 2024 17:59
Create Calendar Event From Due Date within a Jira Ticket
/*
TO-DO:
- [X] Modularize Create New Function parsePayload
- [X] Modularize Create New Function constructEventDetails
- [X] Modularize Create New Function createCalendarEvent
- [X] Make Jira Ticket Reporter also the Google Calendar Event Creator
- [X] Automatically add the Ticket URL into the Calendar Event Description
- [ ] Make it sync bi-directional sync
- [ ] Separate out the global constants into a separate file "Constants.gs"
- [ ] Separate out the Calendar scheduling functions into a separate file "CalendarUtils.gs"
@austinsonger
austinsonger / oss.md
Created July 18, 2024 16:19
Evaluating Open Source Software as Dependencies

Avoid New Dependencies

  • Use existing (possibly indirect) dependencies.
  • Minimize attack surface.

Evaluate Intended Version

  • Verify software version (not personal/attacker-controlled fork).
  • Check project name and website link.
  • Verify fork relation on GitHub/GitLab.
@austinsonger
austinsonger / instructions.md
Last active December 6, 2024 19:19
Template for Custom GPT Instructions
  • Always put // before a single instruction.
  • ChatGPT will read instructions behind // but it won't include what is behind // in the response
  • Sometimes ChatGPT will add stuff from instructions in the response, but with // it won't.
// 1. Role and Purpose: As a [GPT Name], your role is to [Purpose/Function]. You are designed to [Brief Description of What the GPT Does].
// 2. Introduction: You are [GPT Name], purposed to [Purpose/Function]. You are here to assist users with [Specific Tasks or Services].
@austinsonger
austinsonger / 0. Proof of Concept - Elastic Detection: VIP - Executive impersonation in subject (untrusted).md
Last active July 2, 2024 18:38
Proof of Concept - Elastic Detection: VIP / Executive impersonation in subject (untrusted)

This detection rule is designed to identify emails where the sender's subject contains the display name of a VIP or executive from a predefined list (org_vips), and the sender has never been seen before. This rule is particularly useful for detecting Business Email Compromise (BEC) or fraud attempts targeting high-profile individuals within an organization.

Pre-requisites

  • org_vips List: A list of display names of VIPs or executives that must be manually connected to a VIP group of your upstream provider (Google Workspace).
  • Email Provider: Google Workspace.

Explanation of the Query

  1. Basic Event Filtering:
@austinsonger
austinsonger / volatilitybased.py
Created June 22, 2024 18:20
Volatility-Based Trading Signal Algorithm: This algorithm leverages multiple technical indicators to evaluate market conditions and generate a consolidated trading signal ranging from -3 to +3. Each indicator contributes to the overall score based on its specific criteria, helping traders to identify optimal entry and exit points.
import pandas as pd
import numpy as np
import ta
from ta.volatility import BollingerBands
from ta.momentum import RSIIndicator, StochasticOscillator
from ta.trend import MACD, EMAIndicator
from ta.volume import OnBalanceVolumeIndicator
def calculate_signal(df):
# Calculate Bollinger Bands
AccessKeysRotated:
- Frameworks:
- PCI DSS:
- ''
- NIST 800-53:
- ''
- HIPAA Security:
- ''
- FedRAMP:
- ''
@austinsonger
austinsonger / hostXMRNode.md
Created June 11, 2024 09:39 — forked from tannerdsilva/hostXMRNode.md
How To Build And Host a Monero Node from Source

How to Build and Install a Monero Node on a Debian-based System

Hello. In this document, we will walk through the steps of building and hosting your own Monero node from source on a Debian-based Linux system. These systems include Raspbian, Debian (9 and above), and Ubuntu (18.04 and above). This tutorial assumes that you are capable of accessing the ROOT terminal of your Debian-based system, and are capable of getting your system online if necessary. You may plan on using an external storage device to store the blockchain, this tutorial will include the optional steps to support external storage. Alternatively, this setup procedure can also accomodate users looking to host a pruned blockchain with restricted storage space.

Here are some useful links for reaching this prerequisite if you do not currently have access to a Debian-based system that meets the recommended system requirements.

@austinsonger
austinsonger / block-webserver-scanners.sh
Last active May 26, 2024 15:14
Bash script that blocks web server scanner IP Addresses after they scan once.
#!/bin/bash
######################### Common Functions #########################
# Function to process log files
process_log() {
local log_file=$1
local output_file=$2
local temp_file=$3
local ip_column=$4
#!/bin/zsh
###################################################################################################
# Created by Noah Anderson | [email protected] | Kandji, Inc. | Systems Engineering
###################################################################################################
# Created on 07/22/2022
###################################################################################################
# Software Information
###################################################################################################
#
# Script downloads two .apps, one for Intel architecture, one for Apple silicon, and
Rank Type Prefix/Suffix Length
1 Prefix my+ 2
2 Suffix +online 6
3 Prefix the+ 3
4 Suffix +web 3
5 Suffix +media 5
6 Prefix web+ 3
7 Suffix +world 5
8 Suffix +net 3
9 Prefix go+ 2